UNIX Systems Administrator

Start Date: 2002-01-01End Date: 2002-05-01

Engaged in a cutting-edge operation, in support of Operation Enduring Freedom for Deployable Ground Station (DGS2). Providing continuous and direct imagery support to U-2, Global Hawk, Predator and satellite mission crews. Responsible for configuration and maintenance of organization's operating systems (Sun Microsystems Solaris 2.7Operating System). This included analyzing and resolving problems associated with server hardware and UNIX applications software (CSE and NIS+). Serving as the point of contact for all issues concerning matters of system usage. Providing effective maintenance and identifying, configuring, troubleshooting system hardware and system issues. Installing and controlling user accounts and facilitating catalog system backups on both imagery storage devices and systems operations file. Maintaining familiarity with imagery exploitation software applications to troubleshoot and enhance system performance. Additionally, manages massive network integration with global communications assets, and liaisons with base communications centers. Maintains day-to-day security operations and ensures compliance with directed standards.

Network Systems Administrator

Start Date: 2007-04-01End Date: 2009-12-01

Security Network Administrator for San Antonio based Special Programs located in MacAulay Brown Inc. office. Responsible for managing, maintaining, configuring, updating, troubleshooting network related issues within a SCIF environment. Establishing VLAN's and ACLs in a heterogeneous custom test network consisting of Device Under Test (DUT's). Managed systems include Windows 2000 Domain Controllers, CentOS Enterprise servers, DNS, Cisco Catalyst switches and Integrated Services Router, and large number of Windows XP clients. Configured and developed LDAP to communicate with Active Directory over SSL. Responsibilities include maintaining compliancy and enforcing NSA security policies and standards. Ensure all resources, communications and privileges are fully accessible and available to key members within SCIF environment. Most importantly, ensure all key personnel adhere to proper security policies and procedures set forth by customer. While supporting network related issues, I perform penetration tests (Network Characterization) using methods of identifying specific versions of firmware and operating systems by simulating assorted probes. Process involves an active analysis, extraction, and reporting of system for any potential attributes that may disclose known or unknown hardware or software versions and vulnerabilities with standard data acquisition and analysis tools. Reverse Engineering and analysis of different security mechanisms. The task culminates in software aimed to demonstrate weakness and ultimately strengthen the asset.

UNIX ASIM Systems Administrator

Start Date: 2003-08-01End Date: 2007-04-01

Air Force Intelligence & Information Operations, Lackland AFB, TX (33 IOS) UNIX ASIM Systems Administrator Lead Weapons Systems Technician Specialist with over 11 years direct experience in administering, configuring, maintaining, managing, and securing Air Force networks and proprietary weapons system. Lead ASIM /CIDDS technician, providing support for all AFNOSC's on UNIX Solaris 8 & 9 and Linux 2.6 platforms. Lackland Air Force Base AFNOC/NSD for four years maintaining a 100 percent readiness rate on all weapon systems including VPN technology. Primary functions involve direct support of Air Force weapons systems; sensor fleet, technical operational support to the 33 IOS by monitoring effectiveness of sensors ability to collect and report suspicious activity on both CENTCOM and Air Force NIPRNET and SIPRNET networks worldwide. Perform immediate diagnostic testing either remotley from the 33 IOS or through a local Network System Administrator having direct access to Sensor Fleet equipment. A determination will be made to resolve whether it is a base router problem, a sensor problem or a VPN problem originating from base. Maintains and manages Sensor Fleet and VPN configurations for all deployed Sensor Fleet and VPN equipment deployed and operational worldwide. Maintains and manages capability to upgrade software or other minor system changes for all deployed Sensor Fleet and VPN equipment deployed and operational worldwide. When requested will deploy with equipment to provide direct support to install Sensor Fleet equipment and VPN hardware worldwide. Maintains and manages capability to deploy additional new string matches and alerts to all deployed Sensor Fleet equipment when required in support of CENTCOM and AFCERT Operations. Provides direct support to CENTCOM and AFCERT Operations by providing capability to "omit" Sensor Fleet traffic reporting activity that is not considered to be reviewed in a RealTime operation by CENTCOM and AFCERT analysts. Provides direct support to remote Network System Administrators when hardware is sent as a replacement or is a new site currently being installed. Provides technical advice and assistance to Air Force MAJCOM NOSCs, CENTCOM, and Joint Commands as necessary to resolve network issues and other associated actions necessary to ensure Sensor Fleet sensors are collecting and reporting network activity to NOSC and CENTCOM Directors.

Technical Support Specialist

Start Date: 1999-10-01End Date: 2000-09-01

Anchorage, AK Technical Support Specialist Provided speedy, reliable dial-up and dedicated Internet access to over 25,000 people in Alaska. • Monitored technical operation of ISP server complex and network, maintained records of performance standards, and followed procedures to effectively respond to out-of-tolerance conditions or outages. • Monitored and documented system usage patterns to facilitate planning for system growth • Responded to customer service trouble reports that could not be resolved by basic first-level customer service representatives • Analyzed, diagnosed, and corrected hardware and/or software errors, associated with ISP equipment under the division's control in order to minimize system downtime. • Provide support to commercial ISP customers, business, and engineering staff. • Assisted in installation and maintenance activities and in training of contractors and technical staff to optimize efficiency while maintaining system integrity

Information Protection Manager

Start Date: 1996-04-01End Date: 2000-09-01

Responsible for maintaining all incoming and outgoing computer magnetic media, implementing security and managing a Windows NT based network supporting National Security Agency's (NSA) wide-area network. Assist network administrator and maintenance personnel with system maintenance to keep system operational. • Provided unit-wide computer security training to over 350 personnel annually. • Checked, tested and installed software patch on over 250 information system components to insure they were Y2K compliant. • Maintained accreditation and tracking records on over one million dollars worth of automation equipment. • • Maintained greater than 99% system reliability; received a rating of excellent on all inspections over a four year period. • • Implement latest security technologies to counter potential security weaknesses throughout all unclassified, and classified Air Intelligence Agency (AIA) and National Security Agency (NSA) agency internetworks.